Pikoulas, John, Buchanan, William J, Mannion, Mike and Triantafyllopoulos, K (2002) An Intelligent agent security intrusion system. Engineering of Computer-Based Systems, 2002. Proceedings. Ninth Annual IEEE International Conference and Workshop on the. 94 - 99.
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial.
Download (291kB) | Request a copy
Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing network, thus they must be protected at different levels of the OSI model. At the physical layer, they can be protected by lock-and-key, and at the data link, they can be protected within VLANS (virtual LANs). With the network and transport layers, networks can be secured by firewalls, which monitor source and destination network addresses, and source and destination ports, respectively. At the session level, user names and passwords are be used. Unfortunately, all these methods can be prone to methods which can overcome the protection used. This paper expands the research previously undertaken on a misuse system based on the intelligent agent software technology. The system monitors user actions in real-time and take appropriate actions if necessary. Along with this our system uses a short-term prediction to predict the user behaviour and advises the system administrator accordingly, before the actual actions take place. This paper presents new results, which are based on an increased number of users. We tested our short-term prediction model, introduced the notion of intervention to our model, and found that the results are very close to the actual user behaviour
|Additional Information:||(c) 2002 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. paper presented at Ninth Annual IEEE International Conference and Workshop on the Engineering of Computer-based systems, Lund, Sweden 8th-11th April 2002|
|Uncontrolled Keywords:||Network security; Virtual LAns; firewalls; user validation; intelligent agent software technology; user behaviour;|
|University Divisions/Research Centres:||Faculty of Engineering, Computing and Creative Industries > School of Computing|
|Dewey Decimal Subjects:||000 Computer science, information & general works > 000 Computer science, knowledge & systems > 005 Computer programming, programs & data > 005.8 Data security|
|Library of Congress Subjects:||Q Science > QA Mathematics > QA75 Electronic computers. Computer science|
|Depositing User:||Professor Bill Buchanan|
|Date Deposited:||22 Dec 2010 16:01|
|Last Modified:||20 Aug 2013 15:02|
Actions (login required)
Downloads per month over past year